Manage filesystems using the CLI

This page describes how to view and manage filesystems using the CLI.

Using the CLI, you can perform the following actions:

Several parameters in this topic relate to Key Management System (KMS) configuration, which supports both per-filesystem encryption keys and cluster encryption keys. For more information about how KMS integration works and setup guidance, see KMS management.

View filesystems

Command: weka fs

Use this command to view information on the filesystems in the WEKA system.

Create a filesystem

Command: weka fs create

Use the following command line to create a filesystem:

weka fs create <name> <group-name> <total-capacity> [--obs-name <obs-name>] [--ssd-capacity <ssd-capacity>] [--thin-provision-min-ssd <thin-provision-min-ssd>] [--thin-provision-max-ssd <thin-provision-max-ssd>] [--kms-key-identifier kms-key-identifier] [--kms-namespace kms-namespace] [--kms-role-id kms-role-id] [--kms-secret-id kms-secret-id] [--auth-required auth-required] [--encrypted] [--allow-no-kms] [--data-reduction]

Parameters

Name
Value
Default

name*

A descriptive label for the filesystem, limited to 32 characters and excluding slash (/) or backslash (\).

group-name*

Name of the filesystem group to which the new filesystem is to be connected.

total-capacity*

Total capacity of the new filesystem. Minimum value: 1GiB.

obs-name

Object store name for tiering. Mandatory for tiered filesystems.

ssd-capacity

For tiered filesystems, this is the SSD capacity. If not specified, the filesystem is pinned to SSD. To set a thin provisioned filesystem, the thin-provision-min-ssd attribute must be used instead.

SSD capacity is set to total capacity

thin-provision-min-ssd

For thin-provisioned filesystems, this is the minimum SSD capacity that is ensured to be always available to this filesystem. Must be set when defining a thin-provisioned filesystem. Minimum value: 1GiB.

thin-provision-max-ssd

For thin-provisioned filesystem, this is the maximum SSD capacity the filesystem can consume. The value cannot exceed the total-capacity.

kms-key-identifier

Customize KMS key identifier for this filesystem (only for HashiCorp Vault).

kms-namespace

Customize KMS namespace for this filesystem (only for HashiCorp Vault).

kms-role-id

Customize KMS role-id for this filesystem (only for HashiCorp Vault).

kms-secret-id

Customize KMS secret-id for this filesystem (only for HashiCorp Vault).

auth-required

Require the mounting user to be authenticated for mounting this filesystem. This flag is only effective in the root organization, users in non-root organizations must be authenticated to perform a mount operation. Format: yes or no. See User management.

No

encrypted

Encryption of filesystem.

No

allow-no-kms

Allows the creation of an encrypted filesystem without a KMS configured, though this is considered insecure.

No

data-reduction

Enable data reduction. The filesystem must be non-tired and thin-provisioned. A license with data reduction is required.

No

When creating an encrypted filesystem a KMS must be defined.

To define an encrypted filesystem without a KMS, it is possible to use the--allow-no-kms parameter in the command. This can be useful when running POCs but should not be used in production since the security chain is compromised when a KMS is not used.

If filesystem keys exist when adding a KMS, they are automatically re-encrypted by the KMS for any future use.

Add a filesystem when thin-provisioning is used

To create a new filesystem, the SSD space for the filesystem must be free and unprovisioned. When using thin-provisioned filesystems, that might not be the case. SSD space can be occupied for the thin-provisioned portion of other filesystems. Even if those are tiered, and data can be released (to object-store) or deleted, the SSD space can still get filled when data keeps being written or promoted from the object-store.

To create a new filesystem, in this case, use the weka fs reserve CLI command. Once enough space is cleared from the SSD (either by releasing to object-store or explicitly deleting data), it is possible to create the new filesystem using the reserved space.

Edit a filesystem

Command: weka fs update

Use the following command line to edit an existing filesystem:

weka fs update <name> [--new-name new-name] [--total-capacity total-capacity] [--ssd-capacity ssd-capacity] [--thin-provision-min-ssd thin-provision-min-ssd] [--thin-provision-max-ssd thin-provision-max-ssd] [--data-reduction data-reduction] [--auth-required auth-required] [--kms-key-identifier kms-key-identifier] [--kms-namespace kms-namespace] [--kms-role-id kms-role-id] [--kms-secret-id kms-secret-id] [--use-cluster-kms-key-identifier]

Parameters

Name
Value

name*

Name of the filesystem to edit.

new-name

New name for the filesystem.

total-capacity

Total capacity of the edited filesystem.

ssd-capacity

SSD capacity of the edited filesystem. Minimum value: 1GiB.

thin-provision-min-ssd

For thin-provisioned filesystems, this is the minimum SSD capacity that is ensured to be always available to this filesystem. Minimum value: 1GiB.

thin-provision-max-ssd

For thin-proviosined filesystem, this is the maximum SSD capacity the filesystem can consume. The value must not exceed the total-capacity.

data-reduction

Enable data reduction. The filesystem must be non-tired and thin-provisioned. A license with data reduction is required.

auth-required

Determines if mounting the filesystem requires being authenticated to Weka (weka user login). Possible values: yes or no.

kms-key-identifier

Customize KMS key identifier for this filesystem (only for HashiCorp Vault).

kms-namespace

Customize KMS namespace for this filesystem (only for HashiCorp Vault).

kms-role-id

Customize KMS role-id for this filesystem (only for HashiCorp Vault).

kms-secret-id

Customize KMS secret-id for this filesystem (only for HashiCorp Vault).

use-cluster-kms-key-identifier

Enable cluster KMS configuration for this filesystem, which removes any custom KMS settings previously applied to it.

Delete a filesystem

Command: weka fs delete

Use the following command line to delete a filesystem:

weka fs delete <name> [--purge-from-obs]

Parameters

Name
Value
Default

name*

Name of the filesystem to delete.

purge-from-obs

For a tiered filesystem, if set, all filesystem data is deleted from the object store bucket.

False

Using purge-from-obs removes all data from the object-store. This includes any backup data or snapshots created from this filesystem (if this filesystem has been downloaded from a snapshot of a different filesystem, it will leave the original snapshot data intact).

  • If any of the removed snapshots have been (or are) downloaded and used by a different filesystem, that filesystem will stop functioning correctly, data might be unavailable and errors might occur when accessing the data.

It is possible to either un-tier or migrate such a filesystem to a different object store bucket before deleting the snapshots it has downloaded.

Rewrap the filesystem encryption key

Command: weka fs kms-rewrap

Rewrap operations can be performed per filesystem, enabling each key to be re-encrypted with a new version if there are concerns about key compromise. Use the following command to run this operation:

weka fs kms-rewrap <name>

Parameters

Parameter
Description

name*

Filesystem name

Last updated